Has anyone analyzed these captures or know the details someother way -
Does CTF traffic only have attack traffic or does it contain benign
traffic as well?
In a CTF contest environment I am expecting that all the machines would be
trying to attack some machine and capture the goal.
If there is benign traffic, what is that for?
Any details is much appreciated.

-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a
17f194